I think its greater value is in the online environment rather than the
disaster recovery environment. If you establish your active only pool
as a file device class you can easily keep up with the reclamation and
"with some inactive" becomes "with very few inactive".
Kelly J. Lipp
VP Manufacturi
On 2/17/07, Roger Deschner <[EMAIL PROTECTED]> wrote:
.
True, but "other tools" should not have access to the tapes. If they do,
Tell this to the intruder :) and they're mostly from internal staff.
The simple assumption that "other tools (or people) should not have access
to X" is not enough
.
True, but "other tools" should not have access to the tapes. If they do,
then you've got a much larger data integrity problem to solve. Reading
beyond the end-of-tape mark is not possible when the only program able
to access the tape is the TSM server. If there is a way to run these
"other tools"